Searched refs:dataLength (Results 1 - 6 of 6) sorted by relevance

/system/security/softkeymaster/include/keymaster/
H A Dsoftkeymaster.h33 const size_t keyBlobLength, const uint8_t* data, const size_t dataLength,
/system/security/softkeymaster/
H A Dkeymaster_openssl.cpp475 const size_t dataLength, uint8_t** signedData, size_t* signedDataLength) {
495 if (DSA_sign(0, data, dataLength, tmp, &dsaSize, dsa.get()) <= 0) {
507 const size_t dataLength, uint8_t** signedData, size_t* signedDataLength) {
527 if (ECDSA_sign(0, data, dataLength, tmp, &ecdsaSize, eckey.get()) <= 0) {
539 const size_t dataLength, uint8_t** signedData, size_t* signedDataLength) {
554 UniquePtr<uint8_t, Malloc_Free> signedDataPtr(reinterpret_cast<uint8_t*>(malloc(dataLength)));
561 if (RSA_private_encrypt(dataLength, data, tmp, rsa.get(), RSA_NO_PADDING) <= 0) {
566 *signedDataLength = dataLength;
574 const size_t keyBlobLength, const uint8_t* data, const size_t dataLength, uint8_t** signedData,
594 dataLength, signedDat
474 sign_dsa(EVP_PKEY* pkey, keymaster_dsa_sign_params_t* sign_params, const uint8_t* data, const size_t dataLength, uint8_t** signedData, size_t* signedDataLength) argument
506 sign_ec(EVP_PKEY* pkey, keymaster_ec_sign_params_t* sign_params, const uint8_t* data, const size_t dataLength, uint8_t** signedData, size_t* signedDataLength) argument
538 sign_rsa(EVP_PKEY* pkey, keymaster_rsa_sign_params_t* sign_params, const uint8_t* data, const size_t dataLength, uint8_t** signedData, size_t* signedDataLength) argument
572 openssl_sign_data( const keymaster0_device_t*, const void* params, const uint8_t* keyBlob, const size_t keyBlobLength, const uint8_t* data, const size_t dataLength, uint8_t** signedData, size_t* signedDataLength) argument
[all...]
/system/security/keystore/include/keystore/
H A DIKeystoreService.h67 size_t dataLength; member in struct:android::OperationResult
80 size_t dataLength; member in struct:android::ExportResult
173 virtual int32_t verify(const String16& name, const uint8_t* data, size_t dataLength,
191 virtual int32_t addRngEntropy(const uint8_t* data, size_t dataLength) = 0;
217 const uint8_t* data, size_t dataLength, OperationResult* result) = 0;
/system/security/keystore/
H A DIKeystoreService.cpp52 data(NULL), dataLength(0) {
64 dataLength = 0;
71 dataLength = (size_t) length;
87 out->writeInt32(dataLength);
88 if (dataLength && data) {
89 void* buf = out->writeInplace(dataLength);
91 memcpy(buf, data.get(), dataLength);
99 ExportResult::ExportResult() : resultCode(0), exportData(NULL), dataLength(0) {
108 dataLength = 0;
115 dataLength
1102 update(const sp<IBinder>& token, const KeymasterArguments& params, const uint8_t* opData, size_t dataLength, OperationResult* result) argument
[all...]
H A Dkeystore.cpp618 size_t dataLength = mBlob.length + sizeof(mBlob.length); local
620 size_t digestedLength = ((dataLength + AES_BLOCK_SIZE - 1)
627 memset(mBlob.value + mBlob.length, 0, digestedLength - dataLength);
1328 size_t dataLength; local
1337 rc = mDevice->import_keypair(mDevice, key, keyLen, &data, &dataLength);
1345 rc = mFallbackDevice->import_keypair(mFallbackDevice, key, keyLen, &data, &dataLength);
1354 Blob keyBlob(data, dataLength, NULL, 0, TYPE_KEY_PAIR);
2031 int32_t verify(const String16& name, const uint8_t* data, size_t dataLength, argument
2036 return doLegacySignVerify(name, data, dataLength, NULL, NULL, signature, signatureLength,
2060 *pubkeyLength = result.dataLength;
2215 addRngEntropy(const uint8_t* data, size_t dataLength) argument
2564 update(const sp<IBinder>& token, const KeymasterArguments& params, const uint8_t* data, size_t dataLength, OperationResult* result) argument
[all...]
/system/netd/server/
H A DMDnsSdListener.cpp434 int dataLength = strlen(argv[i]); local
435 if (dataLength < 1) {
438 if (dataLength > 255) {
443 if (ptr + dataLength + 1 > txtRecord + sizeof(txtRecord)) {
448 *ptr++ = dataLength;
450 ptr += dataLength;

Completed in 83 milliseconds